Vault Vulnerability: Authenticated Users Can Trigger DoS via Path Glob Policy

Vault Vulnerability: Authenticated Users Can Trigger DoS via Path Glob Policy

The National Vulnerability Database has disclosed CVE-2026-3605, a high-severity vulnerability (CVSS 8.1) impacting HashiCorp Vault Community and Enterprise editions. This isn’t a remote code execution or data exfiltration flaw, but it’s a critical denial-of-service vector that demands immediate attention from anyone running Vault.

Specifically, an authenticated user with access to a kvv2 path, governed by a policy containing a glob (*), can delete secrets they were not explicitly authorized to read or write. This is a classic authorization bypass, even if it’s limited in scope. While it doesn’t allow cross-namespace deletion or secret data exfiltration, the ability to arbitrarily delete secrets within an authorized path is disastrous for operational integrity.

Think about the attacker’s calculus here. They don’t need to exfiltrate data to cause chaos. A well-placed deletion of critical secrets – API keys, database credentials, certificates – can bring down entire applications, services, or even infrastructure. This isn’t about data theft; it’s about operational disruption and integrity compromise.

For CISOs and security architects, this highlights the perennial challenge of managing granular permissions, especially with dynamic secrets and infrastructure-as-code. Glob policies are convenient, but they introduce complexity that can easily lead to unintended authorization boundaries. This vulnerability is a stark reminder that convenience often comes with a security cost.

Defenders need to understand that an attacker, once authenticated, doesn’t need elevated privileges to exploit this. A standard user account, if its policy is misconfigured with a glob on a kvv2 path, becomes a weapon. This underscores the importance of least privilege principles and rigorous policy review, particularly in highly sensitive systems like secret managers.

The fix is available in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. If you’re running any earlier version, you are exposed. This isn’t a vulnerability to defer patching on; the potential for catastrophic service disruption is too high.

What This Means For You

  • If your organization uses HashiCorp Vault, immediately identify all instances and their versions. **Prioritize patching to Vault Community Edition 2.0.0 or Vault Enterprise 2.0.0, 1.21.5, 1.20.10, or 1.19.16.** After patching, audit your Vault policies, specifically looking for `kvv2` paths with glob characters (`*`) that grant deletion capabilities to authenticated users. Revoke or refine any overly permissive policies that could allow unauthorized secret deletion.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rules · 6 SIEM formats

1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.

high vulnerability event-type

Exploitation Attempt — CVE-2026-3605

Sigma YAML — free preview
✓ Sigma 🔒 Splunk SPL 🔒 Sentinel KQL 🔒 Elastic 🔒 QRadar AQL 🔒 Wazuh

Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.

1 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get All SIEM Formats →

Indicators of Compromise

IDTypeIndicator
CVE-2026-3605 Privilege Escalation HashiCorp Vault Community Edition < 2.0.0
CVE-2026-3605 Privilege Escalation HashiCorp Vault Enterprise < 2.0.0
CVE-2026-3605 Privilege Escalation HashiCorp Vault Enterprise 1.21.x < 1.21.5
CVE-2026-3605 Privilege Escalation HashiCorp Vault Enterprise 1.20.x < 1.20.10
CVE-2026-3605 Privilege Escalation HashiCorp Vault Enterprise 1.19.x < 1.19.16

Related Posts

CVE-2026-6080 — SQL Injection

CVE-2026-6080 — The Tutor LMS plugin for WordPress is vulnerable to SQL Injection in versions up to and including 3.9.8. This is due to insufficient...

vulnerabilityCVEmedium-severitysql-injectioncwe-89
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs

Vault DoS: Unauthenticated Attackers Can Block Critical Operations

CVE-2026-5807 — Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying...

vulnerabilityCVEhigh-severitycwe-770
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs

CVE-2026-5502 — The Tutor LMS – eLearning and online course solution plugin

CVE-2026-5502 — The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course content manipulation in versions up to...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs